The picture incorporates just the (hidden) config file, not the trojan, and has no mechanism for infecting programs on its own. You can't be contaminated by simply downloading the image in a very browser.
I thought I https://www.darkexploits.com/product/extremely-silent-jpg-exploit-new/
The Definitive Guide to jpg exploit
Internet 80 days ago xanderzsqw134473Web Directory Categories
Web Directory Search
New Site Listings